News & Analysis as of

Risk Mitigation Data Protection Incident Response Plans

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Association of Certified E-Discovery...

[Webinar] Mastering Information Governance: Strategies for Effective Data Management in the Evolving World of Cybersecurity - June...

Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Robinson+Cole Data Privacy + Security Insider

Health Care Entities Continue to Get Pummeled by Cybersecurity Attacks

The newest health care entity to be hit by a cyberattack is Ascension Health, which operates 140 hospitals and 40 assisted living facilities in 19 states. Ascension confirmed that it has been hit by a cybersecurity attack and...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 2nd, Charlotte, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 1st, Raleigh, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - October 30th, Washington, DC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Sheppard Mullin Richter & Hampton LLP

Ethics & Compliance: Let’s Talk About Cybersecurity

Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more

J.S. Held

Cyber Security & Business Interruption: Foundations for Prevention and Mitigation

J.S. Held on

The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more

Baker Donelson

Beware of Cyber Attacks During the Holiday Season – Royal Ransomware Group Highlighted as Threats to the Health and Public Health...

Baker Donelson on

Statistics show that cybercrime increases significantly during the holiday season. Threat actors anticipate that workers are distracted and more likely to fall victim to a phishing email scam than any other time of the year....more

Goodwin

Nonprofit Organizations and Data Security Incidents — How to Manage and Respond

Goodwin on

As the number of data breaches, security incidents, and ransomware attacks continue to rise, preparation has become even more important — and make no mistake, these attacks are happening to all types of organizations. These...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Robinson+Cole Data Privacy + Security Insider

Colorado Attorney General Issues Data Security Best Practices Guidance Document

The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more

Clark Hill PLC

It’s a New Year and a Good Time for a Cybersecurity Checkup

Clark Hill PLC on

2021 was a game-changing year in cybersecurity, with high profile vulnerabilities and data breaches, and government and private sector responses to them. Examples include Accellion, SolarWinds, Microsoft Exchange, Kaseya,...more

Lowenstein Sandler LLP

The Flaw in Log4j and How It Can Impact Your Business

Lowenstein Sandler LLP on

A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more

Orrick, Herrington & Sutcliffe LLP

Tips for Surviving the First 24 to 48 Hours After an Incident

As cybersecurity incidents become increasingly complex, your initial response to a potential cybersecurity crisis matters. The decisions that you make in the first 24 to 48 hours of a potential cybersecurity incident can have...more

K&L Gates LLP

Not "If" But "When"—The Ever Increasing Threat of a Data Breach in 2021

K&L Gates LLP on

Fourth of July Data Breach - The latest in a recent string of high profile and wide-reaching cyber-attacks occurred over the fourth of July weekend. A criminal hacking enterprise known as REvil targeted information technology...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

NAVEX

The State of Risk Alignment - Alliances Grow Between IT Security and IRM

NAVEX on

While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more

King & Spalding

Ransomware on the Rise in Critical Infrastructure Sector

King & Spalding on

Recent ransomware attacks against U.S. critical infrastructure, which includes the energy sector’s production of oil and natural gas, and other sources of electricity and power, have shed a spotlight on the importance of...more

Association of Certified E-Discovery...

[Webinar] ACEDS Toronto Chapter: The Current Cybersecurity and Privacy Landscape - October 1st, 1:00 pm - 2:00 pm ET

Cyber incidents are escalating in frequency, duration, and complexity. Hardly a day goes by without a news story about a breach or a cyberattack. In this panel we will explore the current cyber and privacy landscape, the...more

White & Case LLP

Cybersecurity: Legal implications and risk management - Cybersecurity crisis management

White & Case LLP on

In an increasingly interconnected world, cyber risk is firmly at the top of the boardroom agenda, and having an effective data breach response programme is no longer optional. ...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide